Across
- 2. Used to quickly identify and respond to suspicious transactions
- 3. System that assigns risk levels to transactions and customers based on various factors
- 7. Understanding normal customer behavior in order to distinguish from fraudulent activity and common customer pattern
- 9. Practice ______ to ensure legal adherence and best practices for security
- 10. Used to track location of transactions and flag unusual/unexpected location changes
- 12. An extra layer of security used alongside credentials
- 13. Performed to identify vulnerabilities in bank's systems and processes
- 14. Making sure data and transaction from customer are kept secure and encrypted from unauthorized access
- 15. Machine learning models that can help identify patterns and anomalies indicative of fraudulent activity.
Down
- 1. Steps to take in the event of a security incident
- 4. This collective approach can help in early detection and prevention.
- 5. Informing customers of ways to recognize phishing and other fraudulent activity
- 6. Needs to stay updated in order to stay ahead of evolving fraud tactics
- 8. Training bank staff to recognize and report potential fraudulent activity
- 11. Update and review to incorporate latest technologies and best practices
